Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.85.147.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9786
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;10.85.147.53.			IN	A

;; AUTHORITY SECTION:
.			451	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023111502 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 16 12:41:56 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 53.147.85.10.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.147.85.10.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.99.148.4 attack
Attempted WordPress login: "GET /wp-login.php"
2020-10-07 20:48:50
139.59.232.188 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-07 21:20:34
120.236.55.130 attackbotsspam
Port scan on 1 port(s): 23
2020-10-07 20:54:43
152.245.38.28 attack
Oct  7 02:14:52 lunarastro sshd[2994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.245.38.28 
Oct  7 02:14:54 lunarastro sshd[2994]: Failed password for invalid user admin from 152.245.38.28 port 11723 ssh2
2020-10-07 21:16:59
2a01:cb0c:c9d:6300:1419:9aec:d676:6ed9 attackbotsspam
Wordpress attack
2020-10-07 20:51:09
106.13.82.49 attack
SSH Brute-force
2020-10-07 21:09:14
140.143.247.30 attackspam
Oct  7 12:32:39 nopemail auth.info sshd[20390]: Disconnected from authenticating user root 140.143.247.30 port 43252 [preauth]
...
2020-10-07 21:14:47
182.150.57.34 attackspam
Invalid user wsx123456 from 182.150.57.34 port 46445
2020-10-07 20:51:43
121.69.89.78 attackbots
Oct  7 14:28:10 OPSO sshd\[30558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.89.78  user=root
Oct  7 14:28:11 OPSO sshd\[30558\]: Failed password for root from 121.69.89.78 port 57104 ssh2
Oct  7 14:32:38 OPSO sshd\[31326\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.89.78  user=root
Oct  7 14:32:40 OPSO sshd\[31326\]: Failed password for root from 121.69.89.78 port 59756 ssh2
Oct  7 14:36:51 OPSO sshd\[31967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.69.89.78  user=root
2020-10-07 20:52:45
106.13.34.131 attackbots
repeated SSH login attempts
2020-10-07 21:22:50
190.75.149.11 attackbots
Unauthorized connection attempt from IP address 190.75.149.11 on Port 445(SMB)
2020-10-07 20:58:12
192.241.228.251 attack
Oct  7 12:10:10 ns382633 sshd\[497\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.228.251  user=root
Oct  7 12:10:12 ns382633 sshd\[497\]: Failed password for root from 192.241.228.251 port 51936 ssh2
Oct  7 12:17:06 ns382633 sshd\[1499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.228.251  user=root
Oct  7 12:17:08 ns382633 sshd\[1499\]: Failed password for root from 192.241.228.251 port 55442 ssh2
Oct  7 12:21:43 ns382633 sshd\[2177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.228.251  user=root
2020-10-07 20:56:23
218.92.0.205 attack
Oct  7 08:26:04 shivevps sshd[27111]: Failed password for root from 218.92.0.205 port 44565 ssh2
Oct  7 08:26:07 shivevps sshd[27111]: Failed password for root from 218.92.0.205 port 44565 ssh2
Oct  7 08:26:08 shivevps sshd[27111]: Failed password for root from 218.92.0.205 port 44565 ssh2
...
2020-10-07 20:52:14
175.6.35.46 attack
Oct  7 13:00:08 rocket sshd[30368]: Failed password for root from 175.6.35.46 port 45980 ssh2
Oct  7 13:02:54 rocket sshd[30713]: Failed password for root from 175.6.35.46 port 49238 ssh2
...
2020-10-07 21:04:03
112.85.42.176 attack
2020-10-07T12:48:51.840099shield sshd\[15285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
2020-10-07T12:48:53.387274shield sshd\[15285\]: Failed password for root from 112.85.42.176 port 2428 ssh2
2020-10-07T12:48:56.960306shield sshd\[15285\]: Failed password for root from 112.85.42.176 port 2428 ssh2
2020-10-07T12:49:00.074694shield sshd\[15285\]: Failed password for root from 112.85.42.176 port 2428 ssh2
2020-10-07T12:49:02.950225shield sshd\[15285\]: Failed password for root from 112.85.42.176 port 2428 ssh2
2020-10-07 21:00:41

Recently Reported IPs

10.86.184.187 10.81.225.216 10.85.138.177 10.85.10.155
10.81.193.4 10.81.72.187 10.85.228.237 10.86.53.232
10.80.31.65 10.83.32.247 10.84.95.36 10.86.221.196
10.84.205.111 10.85.128.192 10.84.102.132 10.80.205.88
10.8.197.93 10.85.60.131 10.80.132.33 10.8.136.90